Skip to content

Commit aa1b849

Browse files
committed
Get NPM signing keys from @sigstore/tuf
Instead of hardcoding NPM signing keys for verification we get them from sigstore’s TUF repository. This is in line with how npm implements signature verification. Fixes #616, fixes #612
1 parent 679bcef commit aa1b849

12 files changed

+340
-62
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
diff --git a/dist/fetcher.js b/dist/fetcher.js
2+
index f966ce1bb0cdc6c785ce1263f1faea15d3fe764c..111588c64ba0cc049cabeb471d39f0fdc78bbb7e 100644
3+
--- a/dist/fetcher.js
4+
+++ b/dist/fetcher.js
5+
@@ -6,7 +6,7 @@ Object.defineProperty(exports, "__esModule", { value: true });
6+
exports.DefaultFetcher = exports.BaseFetcher = void 0;
7+
const debug_1 = __importDefault(require("debug"));
8+
const fs_1 = __importDefault(require("fs"));
9+
-const make_fetch_happen_1 = __importDefault(require("make-fetch-happen"));
10+
+const stream = require("node:stream")
11+
const util_1 = __importDefault(require("util"));
12+
const error_1 = require("./error");
13+
const tmpfile_1 = require("./utils/tmpfile");
14+
@@ -61,14 +61,12 @@ class DefaultFetcher extends BaseFetcher {
15+
}
16+
async fetch(url) {
17+
log('GET %s', url);
18+
- const response = await (0, make_fetch_happen_1.default)(url, {
19+
- timeout: this.timeout,
20+
- retry: this.retry,
21+
- });
22+
+ const response = await globalThis.tufJsFetch(url);
23+
+
24+
if (!response.ok || !response?.body) {
25+
throw new error_1.DownloadHTTPError('Failed to download', response.status);
26+
}
27+
- return response.body;
28+
+ return stream.Readable.fromWeb(response.body);
29+
}
30+
}
31+
exports.DefaultFetcher = DefaultFetcher;

README.md

+11-2
Original file line numberDiff line numberDiff line change
@@ -355,8 +355,17 @@ same major line. Should you need to upgrade to a new major, use an explicit
355355
[`proxy-from-env`](https://github.com/Rob--W/proxy-from-env).
356356

357357
- `COREPACK_INTEGRITY_KEYS` can be set to an empty string or `0` to
358-
instruct Corepack to skip integrity checks, or to a JSON string containing
359-
custom keys.
358+
instruct Corepack to skip signature verification, or to a JSON string
359+
containing custom keys. The format based on the response of the
360+
`GET /-/npm/v1/keys` endpoint of npm registry under the `npm` key. That is,
361+
362+
```bash
363+
curl https://registry.npmjs.org/-/npm/v1/keys | jq -c '{npm: .keys}'
364+
```
365+
366+
See the [npm documentation on
367+
signatures](https://docs.npmjs.com/about-registry-signatures) for more
368+
information.
360369

361370
## Troubleshooting
362371

package.json

+4-1
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,8 @@
1818
"license": "MIT",
1919
"packageManager": "yarn@4.6.0+sha512.5383cc12567a95f1d668fbe762dfe0075c595b4bfff433be478dbbe24e05251a8e8c3eb992a986667c1d53b6c3a9c85b8398c35a960587fbd9fa3a0915406728",
2020
"devDependencies": {
21+
"@sigstore/tuf": "^3.1.0",
22+
"@sinonjs/fake-timers": "^14.0.0",
2123
"@types/debug": "^4.1.5",
2224
"@types/node": "^20.4.6",
2325
"@types/proxy-from-env": "^1",
@@ -43,7 +45,8 @@
4345
"which": "^5.0.0"
4446
},
4547
"resolutions": {
46-
"undici-types": "6.x"
48+
"undici-types": "6.x",
49+
"tuf-js@npm:^3.0.1": "patch:tuf-js@npm%3A3.0.1#~/.yarn/patches/tuf-js-npm-3.0.1-9135d15fbd.patch"
4750
},
4851
"scripts": {
4952
"build": "run clean && run build:bundle && tsx ./mkshims.ts",

sources/corepackUtils.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -289,7 +289,7 @@ export async function installVersion(installTarget: string, locator: Locator, {s
289289
if (signatures! == null || integrity! == null)
290290
({signatures, integrity} = (await npmRegistryUtils.fetchTarballURLAndSignature(registry.package, version)));
291291

292-
npmRegistryUtils.verifySignature({signatures, integrity, packageName: registry.package, version});
292+
await npmRegistryUtils.verifySignature({signatures, integrity, packageName: registry.package, version});
293293
// @ts-expect-error ignore readonly
294294
build[1] = Buffer.from(integrity.slice(`sha512-`.length), `base64`).toString(`hex`);
295295
}

sources/httpUtils.ts

+1-1
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ export async function fetchUrlStream(input: string | URL, init?: RequestInit) {
9292

9393
let ProxyAgent: typeof import('undici').ProxyAgent;
9494

95-
async function getProxyAgent(input: string | URL) {
95+
export async function getProxyAgent(input: string | URL) {
9696
const {getProxyForUrl} = await import(`proxy-from-env`);
9797

9898
// @ts-expect-error - The internal implementation is compatible with a WHATWG URL instance

sources/npmRegistryUtils.ts

+105-26
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,14 @@
1+
import * as sigstoreTuf from '@sigstore/tuf';
12
import {UsageError} from 'clipanion';
2-
import {createVerify} from 'crypto';
3+
import assert from 'node:assert';
4+
import * as crypto from 'node:crypto';
5+
import * as path from 'node:path';
36

47
import defaultConfig from '../config.json';
58

69
import {shouldSkipIntegrityCheck} from './corepackUtils';
10+
import * as debugUtils from './debugUtils';
11+
import * as folderUtils from './folderUtils';
712
import * as httpUtils from './httpUtils';
813

914
// load abbreviated metadata as that's all we need for these calls
@@ -32,38 +37,112 @@ export async function fetchAsJson(packageName: string, version?: string) {
3237
return httpUtils.fetchAsJson(`${npmRegistryUrl}/${packageName}${version ? `/${version}` : ``}`, {headers});
3338
}
3439

35-
export function verifySignature({signatures, integrity, packageName, version}: {
40+
interface KeyInfo {
41+
keyid: string;
42+
// base64 encoded DER SPKI
43+
keyData: string;
44+
}
45+
46+
async function fetchSigstoreTufKeys(): Promise<Array<KeyInfo> | null> {
47+
// This follows the implementation for npm.
48+
// See https://github.com/npm/cli/blob/3a80a7b7d168c23b5e297cba7b47ba5b9875934d/lib/utils/verify-signatures.js#L174
49+
let keysRaw: string;
50+
try {
51+
// @ts-expect-error inject custom fetch into monkey-patched `tuf-js` module.
52+
globalThis.tufJsFetch = async (input: string) => {
53+
const agent = await httpUtils.getProxyAgent(input);
54+
return await globalThis.fetch(input, {
55+
dispatcher: agent,
56+
});
57+
};
58+
const sigstoreTufClient = await sigstoreTuf.initTUF({
59+
cachePath: path.join(folderUtils.getCorepackHomeFolder(), `_tuf`),
60+
});
61+
keysRaw = await sigstoreTufClient.getTarget(`registry.npmjs.org/keys.json`);
62+
} catch (error) {
63+
console.warn(`Warning: Failed to get signing keys from Sigstore TUF repo`, error);
64+
return null;
65+
}
66+
67+
// The format of the key file is undocumented but follows `PublicKey` from
68+
// sigstore/protobuf-specs.
69+
// See https://github.com/sigstore/protobuf-specs/blob/main/gen/pb-typescript/src/__generated__/sigstore_common.ts
70+
const keysFromSigstore = JSON.parse(keysRaw) as {keys: Array<{keyId: string, publicKey: {rawBytes: string, keyDetails: string}}>};
71+
72+
return keysFromSigstore.keys.filter(key => {
73+
if (key.publicKey.keyDetails === `PKIX_ECDSA_P256_SHA_256`) {
74+
return true;
75+
} else {
76+
debugUtils.log(`Unsupported verification key type ${key.publicKey.keyDetails}`);
77+
return false;
78+
}
79+
}).map(k => ({
80+
keyid: k.keyId,
81+
keyData: k.publicKey.rawBytes,
82+
}));
83+
}
84+
85+
async function getVerificationKeys(): Promise<Array<KeyInfo>> {
86+
let keys: Array<{keyid: string, key: string}>;
87+
88+
if (process.env.COREPACK_INTEGRITY_KEYS) {
89+
// We use the format of the `GET /-/npm/v1/keys` endpoint with `npm` instead
90+
// of `keys` as the wrapping key.
91+
const keysFromEnv = JSON.parse(process.env.COREPACK_INTEGRITY_KEYS) as {npm: Array<{keyid: string, key: string}>};
92+
keys = keysFromEnv.npm;
93+
debugUtils.log(`Using COREPACK_INTEGRITY_KEYS to verify signatures: ${keys.map(k => k.keyid).join(`, `)}`);
94+
return keys.map(k => ({
95+
keyid: k.keyid,
96+
keyData: k.key,
97+
}));
98+
}
99+
100+
101+
const sigstoreKeys = await fetchSigstoreTufKeys();
102+
if (sigstoreKeys) {
103+
debugUtils.log(`Using NPM keys from @sigstore/tuf to verify signatures: ${sigstoreKeys.map(k => k.keyid).join(`, `)}`);
104+
return sigstoreKeys;
105+
}
106+
107+
debugUtils.log(`Falling back to built-in npm verification keys`);
108+
return defaultConfig.keys.npm.map(k => ({
109+
keyid: k.keyid,
110+
keyData: k.key,
111+
}));
112+
}
113+
114+
let verificationKeysCache: Promise<Array<KeyInfo>> | null = null;
115+
116+
export async function verifySignature({signatures, integrity, packageName, version}: {
36117
signatures: Array<{keyid: string, sig: string}>;
37118
integrity: string;
38119
packageName: string;
39120
version: string;
40121
}) {
41122
if (!Array.isArray(signatures) || !signatures.length) throw new Error(`No compatible signature found in package metadata`);
42123

43-
const {npm: trustedKeys} = process.env.COREPACK_INTEGRITY_KEYS ?
44-
JSON.parse(process.env.COREPACK_INTEGRITY_KEYS) as typeof defaultConfig.keys :
45-
defaultConfig.keys;
46-
47-
let signature: typeof signatures[0] | undefined;
48-
let key!: string;
49-
for (const k of trustedKeys) {
50-
signature = signatures.find(({keyid}) => keyid === k.keyid);
51-
if (signature != null) {
52-
key = k.key;
53-
break;
54-
}
55-
}
56-
if (signature?.sig == null) throw new UsageError(`The package was not signed by any trusted keys: ${JSON.stringify({signatures, trustedKeys}, undefined, 2)}`);
57-
58-
const verifier = createVerify(`SHA256`);
59-
verifier.end(`${packageName}@${version}:${integrity}`);
60-
const valid = verifier.verify(
61-
`-----BEGIN PUBLIC KEY-----\n${key}\n-----END PUBLIC KEY-----`,
62-
signature.sig,
63-
`base64`,
64-
);
124+
if (!verificationKeysCache)
125+
verificationKeysCache = getVerificationKeys();
126+
127+
const keys = await verificationKeysCache;
128+
const keyInfo = keys.find(({keyid}) => signatures.some(s => s.keyid === keyid));
129+
if (keyInfo == null)
130+
throw new Error(`Cannot find key to verify signature. signature keys: ${signatures.map(s => s.keyid)}, verification keys: ${keys.map(k => k.keyid)}`);
131+
132+
const signature = signatures.find(({keyid}) => keyid === keyInfo.keyid);
133+
assert(signature);
134+
135+
const verifier = crypto.createVerify(`SHA256`);
136+
const payload = `${packageName}@${version}:${integrity}`;
137+
verifier.end(payload);
138+
const key = crypto.createPublicKey({key: Buffer.from(keyInfo.keyData, `base64`), format: `der`, type: `spki`});
139+
const valid = verifier.verify(key, signature.sig, `base64`);
140+
65141
if (!valid) {
66-
throw new Error(`Signature does not match`);
142+
throw new Error(
143+
`Signature verification failed for ${payload} with key ${keyInfo.keyid}\n` +
144+
`If you are using a custom registry you can set COREPACK_INTEGRITY_KEYS.`,
145+
);
67146
}
68147
}
69148

@@ -74,7 +153,7 @@ export async function fetchLatestStableVersion(packageName: string) {
74153

75154
if (!shouldSkipIntegrityCheck()) {
76155
try {
77-
verifySignature({
156+
await verifySignature({
78157
packageName, version,
79158
integrity, signatures,
80159
});

tests/_registryServer.mjs

+14-14
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,14 @@ import {gzipSync} from 'node:zlib';
77
let privateKey, keyid;
88

99
switch (process.env.TEST_INTEGRITY) {
10+
case `invalid_npm_signature`: {
11+
// Claim to use a known NPM signing key but provide an invalid signature
12+
keyid = `SHA256:DhQ8wR5APBvFHLF/+Tc+AYvPOdTpcIDqOhxsBHRwC7U`;
13+
({privateKey} = generateKeyPairSync(`ec`, {
14+
namedCurve: `sect239k1`,
15+
}));
16+
break;
17+
}
1018
case `invalid_signature`: {
1119
({privateKey} = generateKeyPairSync(`ec`, {
1220
namedCurve: `sect239k1`,
@@ -195,6 +203,7 @@ if (process.env.AUTH_TYPE === `PROXY`) {
195203
}
196204

197205
server.listen(0, `localhost`);
206+
server.unref();
198207
await once(server, `listening`);
199208

200209
const {address, port} = server.address();
@@ -222,17 +231,8 @@ switch (process.env.AUTH_TYPE) {
222231
default: throw new Error(`Invalid AUTH_TYPE in env`, {cause: process.env.AUTH_TYPE});
223232
}
224233

225-
if (process.env.NOCK_ENV === `replay`) {
226-
const originalFetch = globalThis.fetch;
227-
globalThis.fetch = function fetch(i) {
228-
if (!`${i}`.startsWith(
229-
process.env.AUTH_TYPE === `PROXY` ?
230-
`http://example.com` :
231-
`http://${address.includes(`:`) ? `[${address}]` : address}:${port}`))
232-
throw new Error(`Unexpected request to ${i}`);
233-
234-
return Reflect.apply(originalFetch, this, arguments);
235-
};
236-
}
237-
238-
server.unref();
234+
globalThis.fetch.passthroughUrls.push(
235+
process.env.AUTH_TYPE === `PROXY` ?
236+
`http://example.com` :
237+
`http://${address.includes(`:`) ? `[${address}]` : address}:${port}`,
238+
);

tests/_runCli.ts

+7-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,13 @@ export async function runCli(cwd: PortablePath, argv: Array<string>, withCustomR
88
const err: Array<Buffer> = [];
99

1010
return new Promise((resolve, reject) => {
11-
const child = spawn(process.execPath, [`--no-warnings`, ...(withCustomRegistry ? [`--import`, pathToFileURL(path.join(__dirname, `_registryServer.mjs`)) as any as string] : [`-r`, require.resolve(`./recordRequests.js`)]), require.resolve(`../dist/corepack.js`), ...argv], {
11+
const child = spawn(process.execPath, [
12+
`--no-warnings`,
13+
...(withCustomRegistry ? [`--import`, pathToFileURL(path.join(__dirname, `_registryServer.mjs`)).toString()] : []),
14+
`--require`, require.resolve(`./recordRequests.js`),
15+
require.resolve(`../dist/corepack.js`),
16+
...argv,
17+
], {
1218
cwd: npath.fromPortablePath(cwd),
1319
env: process.env,
1420
stdio: `pipe`,

0 commit comments

Comments
 (0)